共 17 条
[1]
Chen L.C., Lin C., Combining theory with practice in information security education, Proceedings of the 11Th Colloquium for Information Systems Security Education, pp. 28-35, (2007)
[2]
Trabelsi Z., Ibrahim W., A hands-on approach for teaching denial of service attacks: A case study, J Inf Technol Educ Innovations Pract, 12, pp. 299-319, (2013)
[3]
Bouhoula A., Trabelsi Z., Barka E., Benelbahri M.A., Firewall filtering rules analysis for anomalies detection, Int J Secur Netw, 3, 3, pp. 161-172, (2008)
[4]
Trabelsi Z., Zeidan S., Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement, 2012 IEEE International Conference on Communications (ICC). IEEE, pp. 1074-1078, (2012)
[5]
Trabelsi Z., Zhang L., Zeidan S., Dynamic rule and rule-field optimisation for improving firewall performance and security, IET Inf Secur, 8, 4, pp. 250-257, (2014)
[6]
Trabelsi Z., Shuaib K., A novel man-in-the-middle intrusion detection scheme for switched LANs, Int J Comput Appl, 30, 3, pp. 234-243, (2008)
[7]
Alnagi K.W., Developing Security-Enhanced Model for Enterprise Network. Developing Security-Enhanced Model for Enterprise Network, (2014)
[8]
Gaigole M.S., Kalyankar M.A., The study of network security with its penetrating attacks and possible security mechanisms, Int J Comput Sci Mob Comput, 45, 5, pp. 728-735, (2015)
[9]
Ritchot B., An enterprise security program and architecture to support business drivers, Technol Innov Manag Rev, 3, 8, (2013)
[10]
Taluja M.S., Dua R.L., Survey on network security, threats & firewalls, Int J Adv Res Comput Eng Technol (IJARCET), 1, 7, (2012)